Last update: September 2, 2024
Check Point Software Technologies Ltd. (“Check Point”, “us” “our”) is committed to ensuring the security of its products. This Vulnerability Disclosure Policy (this “Policy”) provides security researchers with clear guidelines for conducting vulnerability discovery activities and conveys our guidelines and authorization for submitting discovered vulnerabilities to Check Point.
This Policy outlines the systems and types of research covered, the process for submitting vulnerability reports, and the required waiting period before publicly disclosing vulnerabilities. The goal is to foster a collaborative relationship with the security community to enhance the security of our products and protect our customers.
We encourage you to contact us to report potential vulnerabilities in our systems.
Researchers who discover vulnerabilities in our products are expected to follow responsible disclosure principles below:
The following test methods are unauthorized:
Any service not expressly listed above, such as any connected services, are excluded from scope and are not authorized for testing, unless specifically approved by Check Point in writing (in which case you shall be committed to this Policy). Additionally, vulnerabilities found in systems from our vendors fall outside of this Policy’s scope and should be reported directly to the vendor according to their disclosure Policy (if any). Should you have any doubt whether a system is in the scope of this Policy or not, contact us at security-alert@checkpoint.com before starting your research.
Though we develop and maintain other internet-accessible systems or services, we ask that active research and testing only be conducted on the systems and services covered by the scope of this document. If you identify a system outside our current scope that you believe should be tested, please reach out to us for discussion. We may expand the scope of this Policy over time
Report a vulnerability specific to a Check Point product: security-alert@checkpoint.com Report any other (non-product) vulnerability involving Check Point here (select “Non-Product”).
Information submitted under this Policy will be used solely for defensive purposes – to mitigate or remediate vulnerabilities. If your findings include discovered vulnerabilities that may impact not only Check Point’s customers, but also other users of a third party’s product or service, we may share your report with the Cybersecurity and Infrastructure Security Agency (CISA), where it will be handled under their coordinated vulnerability disclosure process. We will not share your name or contact information without express permission.
We accept vulnerability reports at this form or:
Reports may be submitted anonymously. If you share contact information, we will acknowledge receipt of your report within 3 business days.
How can you send an effective report?
To help us triage and prioritize submissions, we recommend that your reports will:
What can you expect from us?
If you choose to share your contact information with us, we commit to coordinating with you as openly and as quickly as possible.
We may revise this Policy from time to time. Any changes will be posted on our website.
Questions regarding this Policy may be sent to security-alert@checkpoint.com. We also welcome suggestions for improving this Policy.